All posts

How to configure Domino Data Lab IAM Roles for secure, repeatable access

Picture this: your data science team wants to train a model against production data, but your security engineer is already sweating about AWS permissions. Everyone wants speed, no one wants a breach. That is exactly where Domino Data Lab IAM Roles step in. In Domino, compute environments spin up dynamically across cloud resources. Each run needs the right identity to fetch data from S3, hit APIs, or write results to secured stores. Manually managing keys or long‑lived credentials is a nightmare

Free White Paper

VNC Secure Access + Customer Support Access to Production: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Picture this: your data science team wants to train a model against production data, but your security engineer is already sweating about AWS permissions. Everyone wants speed, no one wants a breach. That is exactly where Domino Data Lab IAM Roles step in.

In Domino, compute environments spin up dynamically across cloud resources. Each run needs the right identity to fetch data from S3, hit APIs, or write results to secured stores. Manually managing keys or long‑lived credentials is a nightmare. IAM Roles fix that by letting workloads assume scoped, temporary access that stays compliant and auditable. Combined, Domino and IAM form an identity fabric that is both invisible and enforced.

So how does it actually work? Domino maps project-level configuration to cloud IAM Roles that your platform or identity provider trusts. When a data scientist launches a job, Domino brokers the session using STS (Secure Token Service). The job inherits least-privilege access based on that assigned role, then automatically releases it once the compute cluster shuts down. No shared secrets, no overstuffed policies.

To get it right, start with clean boundaries.

  • Create cloud IAM Roles per environment or team function rather than each user.
  • Define permissions with explicit actions against known resource ARNs.
  • Use OIDC integration to connect Domino with IdPs like Okta or Azure AD for federated trust.
  • Rotate assumptions regularly and monitor CloudTrail to verify the lifespan of tokens.

If anything feels brittle, chances are the trust policy is too permissive. Keep everything as narrow as possible. The art is making it easy enough that engineers do not reach for access keys out of frustration.

Continue reading? Get the full guide.

VNC Secure Access + Customer Support Access to Production: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits you can measure

  • Reduced credential sprawl across notebooks and pipelines
  • Automated policy enforcement with full audit trails
  • Faster job startup since tokens issue programmatically
  • Consistent identity mapping between cloud services and Domino users
  • Less manual cleanup when people or projects change

When developers no longer need to file tickets for every permission tweak, velocity jumps. Domino Data Lab IAM Roles automate the boring part of access control. Human focus returns to experiments, not permission errors.

Platforms like hoop.dev take this concept even further by converting your identity and policy logic into runtime guardrails. They continuously enforce who can reach what service, without ever handing off a static key. It is policy as code, applied at the perimeter and logged everywhere it matters.

Quick answer: How do IAM Roles connect with Domino Data Lab?
Domino communicates directly with your cloud provider via OIDC trust. When a run starts, it requests a temporary role credential. That credential limits access to the exact data or compute resources the project specifies. When the run ends, credentials vanish. Safe and repeatable.

Properly tuned IAM Roles turn your data platform into a closed loop of trust: verifiable, temporary, and automated. That is how serious data science infrastructure scales without chaos.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts